Skip to main content

Technology

Benefit Vs. Risk of Facial Recognition Technology

posted onMay 9, 2013
by l33tdawg

Law enforcement agencies are using facial recognition software as a crime-fighting tool. Now businesses are looking to use the technology to reach customers. But a professor questions whether customers are ready for it.

Many states are using the technology to scan driver's licenses to prevent identity fraud. It led to the arrest of a suspected arsonist in New York. And while facial recognition technology could not identify the Boston Marathon bombing suspects, police used the software in their search.

QR Codes Explained: Why You See Those Square Barcodes Everywhere

posted onMay 7, 2013
by l33tdawg

QR codes are plastered on advertisements, billboards, business windows, and products. They appear to be very popular among marketers, although it’s rare to see anyone actually scanning one.

These barcodes can be captured with a smartphone camera — for example, a typical QR code may contain an URL. Scan the QR code with a mobile phone and you’ll be taken to the website the QR code specifies.

AMD's "heterogeneous Uniform Memory Access" coming this year in Kaveri

posted onApril 30, 2013
by l33tdawg

AMD wants to talk about HSA, Heterogeneous Systems Architecture (HSA), its vision for the future of system architectures. To that end, it held a press conference last week to discuss what it's calling "heterogeneous Uniform Memory Access" (hUMA). The company outlined what it was doing, and why, both confirming and reaffirming the things it has been saying for the last couple of years.

Fast Database Emerges from MIT Class, GPUs and Student's Invention

posted onApril 23, 2013
by l33tdawg

Todd Mostak’s first tangle with big data didn’t go well. As a master’s student at the Center of Middle Eastern Studies at Harvard in 2012, he was mapping tweets for his thesis project on Egyptian politics during the Arab Spring uprising. It was taking hours or even days to process the 40 million tweets he was analyzing.

Mostak saw immediately the value in geolocated tweets for socio-economic research, but he did not have access to a system that would allow him to map the large dataset quickly for interactive analysis.

Say goodbye to power cords with USB 3.0 update

posted onApril 23, 2013
by l33tdawg

Intel has revealed that an upcoming update to USB 3.0 SuperSpeed that not only increases the throughput available through the interface, but also the power output. This means that you'll be able to transfer data to your USB 3.0 devices at an increased rate, as well as potentially power a range of items without the need for a dedicated power cord.

'Leccy-stealing, grid-crippling hackers could TAKE DOWN EV-juicing systems

posted onApril 19, 2013
by l33tdawg

Hackers may soon starting abusing electric car charger systems to cripple the electricity grid or as part of money-making scams, a security researcher warns.

Ofer Shezaf, product manager security solutions at HP ArcSight, told delegates at the Hack in the Box conference in Amsterdam that if the industry fails to start securing its systems, it will be setting itself up for a major headache a few years down the line.

Boston bombings: How facial recognition can cut investigation time to seconds

posted onApril 19, 2013
by l33tdawg

After the Boston Marathon bombings, police in the city made a plea for people with cell phone video and pictures to turn over their footage, adding to the hours of surveillance video from nearby businesses. But what would normally take investigators hundreds of hours to review can now take minutes or even seconds, thanks to technology like facial recognition. The software, which can help pick a person out of crowd, looks for differentiating features -- from the shape of a mouth to the ridge on a nose to the distance between a pair of eyes.